HackerOne Blog
Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.
Get the latest news and insights beamed directly to you.
Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs
Facing the Reality: Cybersecurity’s Mounting Pressures
The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches...
Discover more with topics that matter to you most.
AI
Generative Artificial Intelligence (GenAI) is ushering in a new era of how humans leverage technology. At HackerOne, we are combining human intelligence with artificial intelligence at scale to improve the efficiency of people and unlock entirely new capabilities.
Application Security
Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.
Ethical Hacker
Ethical hackers, pentesters, and security researchers. We explain everything you need to know about them and how they can help your organization.
Company News
Stay informed of HackerOne partnerships, integrations, hackathon results, and other developments that keep HackerOne customers two steps ahead of cybercriminals.
Penetration Testing
Follow the latest practices in penetration testing, including API testing, application testing, external networks, internet-facing infrastructure, and more.
Public Policy
HackerOne advocates for policies and standards around the world that support our customers, advance protections for the hacker community, and promote adoption of cybersecurity best practices.
Vulnerability Management
We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.
Engineering Blog
Inside HackerOne Engineering: developing for a safer digital world.
Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs
Resurrecting Shift-Left With Human-in-the-loop AI
Introducing Lightspark's Public Bug Bounty Program
A Partial Victory for AI Researchers
ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments
The 8th Annual Hacker-Powered Security Report